CISSP Q V1.4 DOMAIN 5 Identity and Access Management (IAM) Flashcards
In order to give employees appropriate access rights, a company might choose to determine what tasks need to be accomplished, and then to define what access rights are necessary to accomplish said tasks. What type of access control system would most accurately fit this situation?
A. Rule-based access control and need-to-know.
B. Role-based access control.
C. Need-to-know and least privilege.
D. Non-discretionary access control.
B. Role-based access control.
Role-based access control means determining what people belong in what roles, and then defining what resources the people in these roles should be able to access. While (C) might be tempting, least privilege shouldn’t be considered an access control system.
What answer lists 3 control categories?
A. Preventative, physical, detective
B. Physical, administrative, technical
C. Deterrent, preventative, compensating
D. Administrative, directive, deterrent
C. Deterrent, preventative, compensating
What are the 7 control categories?
D
D
D
C
C
R
P
The 7 control categories (The 7 C’s) are directive, deterrent, detective, compensating, corrective, recovery, and preventative.
What are the 3 control types?
A
T or L
P
The 3 Types (3 T’s) are Administrative, Technical or Logical, and Physical.
Which of the following devices has an embedded microchip which can store enormous amounts of data, double as an access card for doors, and an authenticator for a computer?
A. Smart Card.
B. Proximity card, or “prox card.”
C. PIN card.
D. Magnetic-stripe Card.
A. Smart Card.
The clue in the question is “store enormous amounts of data.” A proximity card and a Mag Stripe card can be used as access cards for doors and even as an authentication mechanism for a computer, but neither can store enormous amounts of data. Pin cards can’t store enormous amounts of data, and also don’t typically open doors.
Which statement BEST describes an access control?
A. A hidden device that permits identity spoofing.
B. A deployment of encryption to protect
authorization systems.
C. A mechanism that helps protect systems by
controlling unauthorized user activities.
D. A systems device that records all user login
attempts.
C. A mechanism that helps protect systems by
controlling unauthorized user activities.
Which of the following operations security activities requires the least amount of training and experience?
A. Maintaining operational resilience.
B. Controlling user accounts.
C. Protecting valuable assets.
D. Managing security services effectively.
B. Controlling user accounts.
To create an effective access control system for your organization’s desktops, what must be created?
A. The company’s computer organizational placement chart.
B. A list that shows which users have requested special
permissions.
C. A set of firewall rules that either permit or deny different
computer systems access to specific services.
D. A set of Kerberos rules that the Kerberos Ticket Granting
Server (TGS) uses to allow users access to certain files.
C. A set of firewall rules that either permit or deny different
computer systems access to specific services.
Allowing differing computers to have differing levels of access to systems is normally done with Rule-based access control. Rule-based control for desktops is usually best done with firewall rule sets.
Which answer below contains two of the MOST accurate biometric systems?
A. Retinal scans and hand geometry.
B. Iris Scans and keystroke dynamics.
C. Fingerprint readers and facial recognition.
D. Iris scans and vascular pattern scans.
D. Iris scans and vascular pattern scans.
(D) is the correct answer. We are looking for the best combo. Retina and Iris scans are commonly agreed to be some of the best due to their high reliability and their low risk for compromise. That allows us to eliminate (C). Focusing on the second half of the combo then, keystroke dynamics isn’t in the same league as a hand scan, so eliminate (B). Between hand geometry and vascular patterns, vascular patterns is more reliable, so (D) is better than (A).
In the context of the Confidentiality, Integrity and Availability (CIA) triad, “Perfect availability” of a resource means which of the following?
A. Availability 24 hours a day, 7 days a week (24/7)
B. Availability whenever authorized users require access to the resource
in order to do their jobs.
C. Availability as appropriate to support the Business Continuity Plan
/ Disaster Recovery Plan (BCP/DR).
D. Full availability even to users in branch offices who have to remote in
to access said resources.
B. Availability whenever authorized users require access to the resource
in order to do their jobs.
In the student manual, availability is defined as “aim[ing] at ensuring that systems are up and running so that persons can use them when they are needed.” Leaving aside the issue that the need for availability extends beyond “systems,” note: “when they are needed.”
(A) would only be appropriate if the resource were needed 24/7.(C)does not extend far enough.(D) is a distractor. “Users in branch offices” need the same kind of availability that other “users” do.
If a system’s security goal is that no subject can gain access to any object without authorization, which of the following should be implemented?
A. The security kernel implementing the reference monitor concept.
B. The ring protection mechanism.
C. Virtual memory mapping and process isolation.
D. Correct management of memory and storage.
A. The security kernel implementing the reference monitor concept.
Answer (A) is correct. Answer (B) is too general, Answer (C) describes how applications work with the OS, and Answer (D) is a distractor.
Which of the following is the best example of two-factor authentication?
A. Requiring a user to use both a digital finger print and an iris scan to get logged in.
B. Requiring a user to provide a 14 character password and also punch in a 8 character access key to a cipher lock located at the entrance door.
C. Requiring a token device to be inserted in a special slot at the entrance door, as well as a keyless entry device.
D. Requiring a token device and a fingerprint.
D. Requiring a token device and a fingerprint.
Answer (D) is correct, as it is “something you have,” a token, and “something you are,” a fingerprint. The rest are single factor, Answer (A) using two biometrics, Answer (B) using two things you know and Answer (C) with two things you have. Dual-factor and multi-factor authentication require “proof” that you are using items from more than one category.
Which of the following is NOT true of Rule-based access control?
- It is unique to mandatory access control systems.
- It is based on the user’s job function.
- It is often implemented by modern firewalls.
- It focuses on provisioning user credentials.
A.2and3
B.1and4
C. 2and4
D. 3and4
B.1and4
Rule-based access control sets up rules used to determine user access. It is frequently configured based on job function, and is commonly implemented with firewalls. Meanwhile, it is not unique to MAC systems (can be used in DAC and NDAC as well) and has nothing to do with provisioning user credentials.
What best describes role-based access control?
A. It is unique to mandatory access control systems.
B. It is often implemented by modern firewalls.
C. It is a set of technologies focusing on provisioning and
decommissioning user credentials.
D. It is configured based on the user’s job function.
D. It is configured based on the user’s job function.
Role-based control is used in MAC, DAC and NDAC systems. Access necessary based on user roles can be implemented in part by firewalls, but this does not make firewalls role- based rather than rule-based access control. Role-based access control is not itself a set of technologies, although it can be implemented via various technologies.
Alice has just successfully logged into a system using Kerberos. She wants to edit a file located on server K, which is in the same domain that she is. Which action best describes how this will be done?
A. Alice can access the file without logging into Server K.
B. Alice logs into Server K and accesses the file.
C. Alice goes back to the Kerberos system, gets a special ticket for Server K, and uses it to log into Server K. Server K will then decide whether
Alice can edit her requested file.
D. Alice goes back to the Kerberos system, gets a special ticket for Server K, and uses it to log into Server K. Since she is an authenticated user, she will be automatically allowed to edit the requested file.
C. Alice goes back to the Kerberos system, gets a special ticket for Server K, and uses it to log into Server K. Server K will then decide whether
Alice can edit her requested file.